Author of the publication

Time maximum control for a class of single-input planar affine control systems and constraints.

, , , and . CDC, page 5045-5050. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Signature-embedding in printed documents for security and forensic applications., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 455-466. SPIE, (2004)Forensic classification of imaging sensor types., , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6505 of SPIE Proceedings, page 65050U. SPIE, (2007)Banding Artifact Reduction for a Class of Color Electrophotographic Printers With Underactuated Motor/Gear Configuration., and . IEEE Trans. Contr. Sys. Techn., 16 (4): 577-588 (2008)Information embedding and extraction for electrophotographic printing processes., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 607210. SPIE, (2006)Time maximum control for a class of single-input planar affine control systems and constraints., , , and . CDC, page 5045-5050. IEEE, (2009)Image Analysis as a Tool for Printer Characterization and Halftoning Algorithm Development (invited)., , , , , and . SSIAI, page 3-8. IEEE Computer Society, (2002)Forensic techniques for classifying scanner, computer generated and digital camera images., , , and . ICASSP, page 1653-1656. IEEE, (2008)Printer identification based on graylevel co-occurrence features for security and forensic applications.., , , , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5681 of Proceedings of SPIE, page 430-440. SPIE, (2005)Using forms for information hiding and coding in electrophotographic documents., , and . WIFS, page 136-140. IEEE, (2009)Improvements on image authentication and recovery using distributed source coding., , , , and . Media Forensics and Security, volume 7254 of SPIE Proceedings, page 725415. SPIE, (2009)